EDITOR

FOUNDER:

CONTRIBUTORS:

Object Relational Technologies form the backbone of most of the enterprise
Java applications. Choosing the appropriate technology however is one of the
most important decisions for an enterprise architect. More often than not,
such a decision is either a hit or miss. Mistakes done in selecting the
appropriate technology results in performance bottlenecks, lack of
scalability, unreliable transaction handling etc.
More than the problem with the specific ORM technology, it's the suitability
of that technology to the underlying business needs and non-functional
requirements. This article aims to establish an objective architecture
evaluation framework for evaluating which ORM technology best fits your
project needs. Based on the requirements, one or the other technology may be
appropriate.
Flexibility
For an ORM framework to be flexible, the following considerations ar... (more)

The way we design business is undergoing profound transformation. For the
past 100 years business design has been directly influenced by Frederick
Taylor, focused on how we do work and how we can make it more efficient. The
LEAN and Six Sigma movements are the visible manifestation of that thinking.
Together with BPM they have focused on incremental improvements of primarily
internal processes and tasks encoded in process orchestration and workflows
that control how the enterprise works.
But this is equivalent to looking in the rear view mirror to design tomorrows
business. In this article we will look at three major trends that are going
to break this conventional model.
Smart behaviors enabling cross ecosystem processes Capability services
(independent business components) enabling continuously evolving business
models The convergence of consumer and business IT e... (more)

Sharing files with friends has never been easier. Whether it is via
old-school hard copy methods like CDs, DVDs and USB drives, nefarious
peer-to-peer torrents like BitTorrent or new shared, private cloud storage
services like Dropbox, getting a photo or music file from one person to
another takes mere seconds.
The problem is that people inside businesses aren't using these services just
to share personal files. They are circumventing secured content management
systems like SharePoint in favor of consumer-friendly services in order to
share files with third parties.
For businesses, Consumerization of Sharing Tools (CoST) can encourage
insecure file sharing and the impact can be startling. WikiLeaks was the
result of a failed SharePoint deployment. The user simply circumvented the
SharePoint system, downloaded extremely sensitive data and made it available
to the w... (more)

From its origin in 1995, SSH, the secure shell data-in-transit protocol, has
been used the world over as a method to transfer data between machines, as
well as a tool to provide remote administrator access. Some variation of the
protocol is packaged free in every version of Unix, Mac OS and Linux.
Recently, its use has grown exponentially in Windows operating systems as
well. While the exact number of worldwide SSH deployments is unknown, it is
estimated that nearly half of all of the World Wide Web uses SSH, making it a
virtually mandatory service in the world of network security.
After nearly two decades of use, SSH has succeeded in securing billions of
business transactions without any faults of the protocol itself,
demonstrating its dependability as a security solution. On the other hand,
the evolution of cyber-threat ability requires that organizations take a ... (more)

People, Process, Technology & Metrics… an ongoing drama.
I’m one of those people who take my work home with me. I know, I know…
there’s that whole work-life balance thing that I’m always
“struggling” to overcome. But, I haven’t yet. I am kind of sorry about
it, but at the same time… not deeply sorry.
Anyway … I’ve wanted to put this concept in an analogy outside of IT for
quite a while now, because these types of discussions can get so heated when
*one such as myself* wants to make commentary about situations that happen
every day. So, here goes…
Goal: Clean Mom’s car as quickly as possible while maintaining peace and
stability in the family.
Metrics: Total Time to clean, Time to de-clutter, time to vacuum, total time
to wash interior, total time to wash exterior, time to put away clutter in
house **that wasn’t put away when children exited car as Mom and Dad asked ... (more)

Cloud Expo

Cloud Computing & All That
It Touches In One Location Cloud Computing - Big Data - Internet of Things
SDDC - WebRTC - DevOps
Cloud computing is become a norm within enterprise IT.

The competition among public cloud providers is red hot, private cloud continues to grab increasing shares of IT budgets, and hybrid cloud strategies are beginning to conquer the enterprise IT world.

Big Data is driving dramatic leaps in resource requirements and capabilities, and now the Internet of Things promises an exponential leap in the size of the Internet and Worldwide Web.

The world of SDX now encompasses Software-Defined Data Centers (SDDCs) as the technology world prepares for the Zettabyte Age.

Add the key topics of WebRTC and DevOps into the mix, and you have three days of pure cloud computing that you simply cannot miss.

Delegates will leave Cloud Expo with dramatically increased understanding the entire scope of the entire cloud computing spectrum from storage to security.

Cloud Expo - the world's most established event - offers a vast selection of 130+ technical and strategic Industry Keynotes, General Sessions, Breakout Sessions, and signature Power Panels. The exhibition floor features 100+ exhibitors offering specific solutions and comprehensive strategies. The floor also features two Demo Theaters that give delegates the opportunity to get even closer to the technology they want to see and the people who offer it.

Attend Cloud Expo. Craft your own custom experience. Learn the latest from the world's best technologists. Find the vendors you want and put them to the test.